PinnedZuhaib MohammedI Took the Smart Contract Auditing Challenge with DetectBox — Join MeIntroductionAug 24, 2023Aug 24, 2023
PinnedZuhaib MohammedinCoinmonksSolidity — transfer vs send vs call functionIn Solidity, there are three ways in which one can send ether. Namely transfer(), send() and call(). In this article, lets discuss how…Dec 31, 20212Dec 31, 20212
Zuhaib MohammedAudit Anomalies Archive — Issue#12I’m sure by now you are aware of the popular front-running attack. The way it work is, a user pays higher gas fees to get their…May 29May 29
Zuhaib MohammedAudit Anomalies Archive — Issue#11Ihave noticed that crypto projects often attempt to re-launch or stay relevant by migrating to a new token. This can happen for various…Apr 12Apr 12
Zuhaib MohammedAudit Anomalies Archive — Issue#10Arrays are essential data structures widely employed in various popular programming languages. They are generally utilized to store data…Feb 10Feb 10
Zuhaib MohammedExploring Missed Vulnerabilities: Code4rena Maia DAO — Ulysses Audit ContestI participated alongside 33audits and hexbyte for this audit. Although we only reported one Medium-Risk Vulnerability, we scored an A…Dec 26, 20231Dec 26, 20231
Zuhaib MohammedExploring Missed Vulnerabilities: Code4rena ENS Audit ContestThe ENS Contest involved a relatively compact codebase for auditing, comprising approximately 200 lines of code. The identified issues…Dec 20, 2023Dec 20, 2023
Zuhaib MohammedAudit Anomalies Archive — Issue#9Smart Contracts utilize the pausable pattern to halt their operation on the blockchain. The primary motivation behind implementing this…Dec 19, 2023Dec 19, 2023
Zuhaib MohammedAudit Anomalies Archive — Issue#8Before delving into the issue at hand, I recommend familiarizing yourself with Issue#7 . Understanding the context is important for…Nov 23, 2023Nov 23, 2023